To apply you need to attempt one skill assessment test as recruiter has attached skill assessment test with this job and wants to see your obtained marks,
So be carefull while attempting this skill assessment test

Suggest a Webinar from this Speaker

Gaurang Pandya is an Infrastructure Security Architect with Unisys Global Services India, having over 11 years of IT experience. He has experience in IT infrastructure Management (Networking & System Administrat... Full Profile

Gaurang Pandya is an Infrastructure Security Architect with Unisys Global Services India, having over 11 years of IT experience. He has experience in IT infrastructure Management (Networking & System Administration), IT Security, Technical support services, and Security Consulting. He has various certifications to his name like GIAC, CISSP, CCSP, among others. His key areas of expertise in Linux are mail, DNS, and NMS with Shell and Perl scripting. He has worked in both attack and defense sides of IT security, having insightful exposure to project management activities including planning, designing, execution, and coordination across various geographies. He was also instrumental in providing DDoS protection service to Internet circuits for Common Wealth Games 2010, New Delhi. show less

This webinar will be a hands-on learning session, which will demonstrate the hidden features of Secure Shell (SSH) protocol live.Key learning areas of the session are:

Multi-factor authentication using keys

Inline command execution

Automatic command execution

Transparent SSH gateways

Secure tunnel creation

SSH connection multiplexing

Traditionally *NIX servers were remotely accessed using Telnet, but since the advent of SSH, Telnet has been phased out. Today, all the UNIX and Linux operating systems support SSH. Unlike traditional Telnet, SSH is a far more advanced protocol and muti-purpose protocol. Besides giving encrypted remote shell access, it also provides features like secure file copy (both pull and push methods), secure X11 forwarding encryption services for other clear text traffic, and SSH connection multiplexing to reduce resource usage. It provides secure services like confidentiality using encryption, secure key exchange by using Diffie-Hellman and RSA based key exchange, and provides data compression. Since SSH has replaced Telnet, administrators too have started using it in the same way as Telnet, which is just for remote shell access. While SSH can be used in many ways and, if used correctly in right situation, can save a lot of work and time for administrators. This presentation will disclose some of the hidden features of the SSH protocol, which may not be used generally but can be quite handy in odd situations.